diff --git a/lib/ansible/modules/network/f5/bigip_asm_policy_manage.py b/lib/ansible/modules/network/f5/bigip_asm_policy_manage.py index d0ecd03965..1cb6b54f22 100644 --- a/lib/ansible/modules/network/f5/bigip_asm_policy_manage.py +++ b/lib/ansible/modules/network/f5/bigip_asm_policy_manage.py @@ -34,9 +34,9 @@ options: state: description: - When C(state) is C(present), and C(template) parameter is provided, - new ASM policy is created from template with the given C(name). + new ASM policy is created from template with the given policy C(name). - When C(state) is present and no C(template) parameter is provided - new blank ASM policy is created with the given C(name). + new blank ASM policy is created with the given policy C(name). - When C(state) is C(absent), ensures that the policy is removed, even if it is currently active. choices: diff --git a/lib/ansible/modules/network/f5/bigip_asm_policy_server_technology.py b/lib/ansible/modules/network/f5/bigip_asm_policy_server_technology.py index 0a32d5117d..4aec0f4b86 100644 --- a/lib/ansible/modules/network/f5/bigip_asm_policy_server_technology.py +++ b/lib/ansible/modules/network/f5/bigip_asm_policy_server_technology.py @@ -22,7 +22,7 @@ version_added: 2.8 options: name: description: - - Specifies the name of the server technology to apply/remove to the ASM policy. + - Specifies the name of the server technology to apply on or remove from the ASM policy. required: True choices: - jQuery diff --git a/lib/ansible/modules/network/f5/bigip_asm_policy_signature_set.py b/lib/ansible/modules/network/f5/bigip_asm_policy_signature_set.py index 4a2531ec18..001d270331 100644 --- a/lib/ansible/modules/network/f5/bigip_asm_policy_signature_set.py +++ b/lib/ansible/modules/network/f5/bigip_asm_policy_signature_set.py @@ -22,9 +22,9 @@ version_added: 2.8 options: name: description: - - Specifies the name of the signature sets to apply/remove to the ASM policy. - - Apart from built-in signature sets that ship with the device, users can create and use - their own signature sets. + - Specifies the name of the signature sets to apply on or remove from the ASM policy. + - Apart from built-in signature sets that ship with the device, users can use user created + signature sets. - When C(All Response Signatures), configures all signatures in the attack signature pool that can review responses. - When C(All Signatures), configures all attack signatures in the attack signature pool. @@ -60,9 +60,9 @@ options: that attempt to run system level commands through a vulnerable application. - When C(OWA Signatures), configures signatures that target attacks against the Microsoft Outlook Web Access (OWA) application. - - When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks - including session fixation, local file access, injection attempts, header tampering, - and so on that could affect many applications. + - When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks, + including session fixation, local file access, injection attempts, header tampering + and so on, affecting many applications. - When C(Path Traversal Signatures), configures signatures targeting attacks that attempt to access files and directories that are stored outside the web root folder. - When C(Predictable Resource Location Signatures), configures signatures targeting attacks that attempt @@ -78,7 +78,7 @@ options: that are integrated using WebSphere including general database, Microsoft Windows, IIS, Microsoft SQL Server, Apache, Oracle, Unix/Linux, IBM DB2, PostgreSQL, and XML. - When C(XPath Injection Signatures), configures signatures targeting attacks that attempt to gain access - to data structures or bypass permissions or access when a web site uses user-supplied information + to data structures or bypass permissions when a web site uses user-supplied information to construct XPath queries for XML data. required: True policy_name: @@ -87,12 +87,12 @@ options: required: True alarm: description: - - Specifies whether the security policy logs the request data in the Statistics screen, - if a request matches a signature that is included in the signature set. + - Specifies if the security policy logs the request data in the Statistics screen, + when a request matches a signature that is included in the signature set. type: bool block: description: - - Effective when the security policy's enforcement mode is Blocking. + - Effective when the security policy`s enforcement mode is Blocking. - Determines how the system treats requests that match a signature included in the signature set. - When C(yes) the system blocks all requests that match a signature, and provides the client with a support ID number.